• 我们不仅通过利用一个操作缓存优化PHP配置探究php级别技术而且探究了如何优化数据库设计实现合理的索引编制

    We looked at techniques not only at the PHP level, by leveraging an opcode cache and optimizing the PHP configuration, but also looked at optimizing your database design for proper indexing.

    youdao

  • 人们包装上的个标签,就会得到一串,然后通过短信形式发送一个计算机系统,通过这个系统可以数据库中查询到相关信息。

    People buying medicine scratch off a panel attached to the packaging. This reveals a code, which they can text to a computer system that looks it up in a database.

    youdao

  • 但是值得牢记许多IPS嗅探器使用基于特征检测方法,这意味着攻击发现的时候才能被加入数据库

    Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.

    youdao

  • 专用标记阅读器手臂附近晃动,无线电信号就会激活微芯片传送识别从而调出电脑数据库客户信息

    If a special tag-reader is waved near the arm, a radio signal prompts the chip to transmit an identification number which is used to call up information about the wearer in a computer database.

    youdao

  • XML是以二进制格式存储数据库中的文本节点存储utf - 8

    XML is stored in the database in a binary format, and the text nodes are stored as UTF-8 code points.

    youdao

  • DB 29中,将XML数据包括数据库中的惟一方法数据库使用UTF - 8

    In DB2 9, the only way to include XML data in a database was to have a UTF-8 code set for the database.

    youdao

  • 下面展示了如何数据库中检索单个

    The following pseudo-code demonstrates how single values can be retrieved from a database.

    youdao

  • 清单4 .test2数据库中添加星星记录。

    Listing 4. test2 code, adding stars to the database.

    youdao

  • 寻找关系模式候选数据库设计理论中的重要问题

    Seeking for candidate key of relation scheme is an important question in designing database theory.

    youdao

  • 通过使用X2O,无需创建自己数据库构建存储过程编写服务器端甚至都不用AS 3代集成数据服务中。

    With it, you don't need to create your own database, build stored procedures, write server-side code, or even integrate your AS3 code to data services.

    youdao

  • 运用数据库基表链接思想根据供应链环节物流特点不同,对各环节的物流跟踪流程进行较为详细的分析。

    Using the thoughts of chaining of primary key of the database, according to the logistics characteristics of different links on supply chain, I have analysed the tracking follow of each link.

    youdao

  • 迈克菲最近项关于资料隐攻击(一种用来渗透数据库技术)调查显示,2011年一季度50%左右黑客攻击都是来自中国

    A recent study by McAfee of "SQL injections", a technique used to penetrate databases, showed that around half of the reported attacks in the first quarter of 2011 originated from China.

    youdao

  • 数据库兼容不断演变最终用户使他们测试利率全部

    The database of compatible codes is continually being evolved by end users who can test and rate all the codes.

    youdao

  • 管理登陆加入验证数据库管理采用MD 5加密

    Management landing by adding a verification code, database management password using MD5 encryption.

    youdao

  • 比较典型对象源代目标(代)数据库文件的相似版本测试结果

    Typical objects of comparison are similar versions of source code, object code, data base files, or test results.

    youdao

  • 文章提出使用指纹纹形、脊线数目基于Gabor滤波指纹特征———指纹构建多级索引指纹数据库此基础上检索多级指纹数据库方法

    This paper proposes not only index of multilevel fingerprint database that is built by fingerprint pattern, ridge count and FingerCode based on Gabor filter but also a search method of it.

    youdao

  • 图书馆管理数据库设计。如果输入的用户 正确可以进入窗口

    If you enter a user name and password are correct, you can enter the main window.

    youdao

  • 图书馆管理数据库设计。如果输入的用户 正确可以进入窗口

    If you enter a user name and password are correct, you can enter the main window.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定